Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Más filtros

Banco de datos
Tipo del documento
País de afiliación
Intervalo de año de publicación
1.
PLoS Comput Biol ; 17(2): e1008670, 2021 02.
Artículo en Inglés | MEDLINE | ID: mdl-33566820

RESUMEN

The dynamics of cerebellar neuronal networks is controlled by the underlying building blocks of neurons and synapses between them. For which, the computation of Purkinje cells (PCs), the only output cells of the cerebellar cortex, is implemented through various types of neural pathways interactively routing excitation and inhibition converged to PCs. Such tuning of excitation and inhibition, coming from the gating of specific pathways as well as short-term plasticity (STP) of the synapses, plays a dominant role in controlling the PC dynamics in terms of firing rate and spike timing. PCs receive cascade feedforward inputs from two major neural pathways: the first one is the feedforward excitatory pathway from granule cells (GCs) to PCs; the second one is the feedforward inhibition pathway from GCs, via molecular layer interneurons (MLIs), to PCs. The GC-PC pathway, together with short-term dynamics of excitatory synapses, has been a focus over past decades, whereas recent experimental evidence shows that MLIs also greatly contribute to controlling PC activity. Therefore, it is expected that the diversity of excitation gated by STP of GC-PC synapses, modulated by strong inhibition from MLI-PC synapses, can promote the computation performed by PCs. However, it remains unclear how these two neural pathways are interacted to modulate PC dynamics. Here using a computational model of PC network installed with these two neural pathways, we addressed this question to investigate the change of PC firing dynamics at the level of single cell and network. We show that the nonlinear characteristics of excitatory STP dynamics can significantly modulate PC spiking dynamics mediated by inhibition. The changes in PC firing rate, firing phase, and temporal spike pattern, are strongly modulated by these two factors in different ways. MLIs mainly contribute to variable delays in the postsynaptic action potentials of PCs while modulated by excitation STP. Notably, the diversity of synchronization and pause response in the PC network is governed not only by the balance of excitation and inhibition, but also by the synaptic STP, depending on input burst patterns. Especially, the pause response shown in the PC network can only emerge with the interaction of both pathways. Together with other recent findings, our results show that the interaction of feedforward pathways of excitation and inhibition, incorporated with synaptic short-term dynamics, can dramatically regulate the PC activities that consequently change the network dynamics of the cerebellar circuit.


Asunto(s)
Corteza Cerebelosa/metabolismo , Redes Neurales de la Computación , Células de Purkinje/citología , Potenciales de Acción/fisiología , Animales , Cerebelo/fisiología , Simulación por Computador , Potenciales Postsinápticos Excitadores/fisiología , Humanos , Interneuronas/fisiología , Modelos Neurológicos , Vías Nerviosas , Plasticidad Neuronal/fisiología , Neuronas/metabolismo , Distribución Normal , Transducción de Señal , Sinapsis/fisiología , Transmisión Sináptica/fisiología
2.
Entropy (Basel) ; 21(8)2019 Jul 26.
Artículo en Inglés | MEDLINE | ID: mdl-33267448

RESUMEN

Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious goal. Therefore, protecting router security has great importance. However, router systems are notoriously difficult to understand or diagnose for their inaccessibility and heterogeneity. A common way of gaining access to the router system and detecting the anomaly behaviors is to inspect the router syslogs or monitor the packets of information flowing to the routers. These approaches just diagnose the routers from one aspect but do not correlate multiple logs. In this paper, we propose an approach to detect the anomalies and faults of the routers with multiple information learning. First, we do the offline learning to transform the benign or corrupted user actions into the syslogs. Then, we construct the log correlation among different events. During the detection phase, we calculate the distance between the event and the cluster to decide if it is an anomalous event and we use the attack chain to predict the potential threat. We applied our approach in a university network which contains Huawei, Cisco and Dlink routers for three months. We aligned our experiment with former work as a baseline for comparison. Our approach obtained 89.6% accuracy in detecting the attacks, which is 5.1% higher than the former work. The results show that our approach performs in limited time as well as memory usages and has high detection and low false positives.

3.
IEEE Trans Cybern ; 54(6): 3638-3651, 2024 Jun.
Artículo en Inglés | MEDLINE | ID: mdl-38215330

RESUMEN

Evolutionary algorithms (EAs), such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users lack the capability to implement EAs for solving COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud server, however, it poses privacy concerns. To this end, this article proposes a novel computing paradigm called evolutionary computation as a service (ECaaS), where a cloud server renders evolutionary computation services for users while ensuring their privacy. Following the concept of ECaaS, this article presents privacy-preserving genetic algorithm (PEGA), a privacy-preserving GA designed specifically for COPs. PEGA enables users, regardless of their domain expertise or resource availability, to outsource COPs to the cloud server that holds a competitive GA and approximates the optimal solution while safeguarding privacy. Notably, PEGA features the following characteristics. First, PEGA empowers users without domain expertise or sufficient resources to solve COPs effectively. Second, PEGA protects the privacy of users by preventing the leakage of optimization problem details. Third, PEGA performs comparably to the conventional GA when approximating the optimal solution. To realize its functionality, we implement PEGA falling in a twin-server architecture and evaluate it on two widely known COPs: 1) the traveling Salesman problem (TSP) and 2) the 0/1 knapsack problem (KP). Particularly, we utilize encryption cryptography to protect users' privacy and carefully design a suite of secure computing protocols to support evolutionary operators of GA on encrypted chromosomes. Privacy analysis demonstrates that PEGA successfully preserves the confidentiality of COP contents. Experimental evaluation results on several TSP datasets and KP datasets reveal that PEGA performs equivalently to the conventional GA in approximating the optimal solution.

4.
Front Comput Neurosci ; 14: 26, 2020.
Artículo en Inglés | MEDLINE | ID: mdl-32372936

RESUMEN

The majority of neurons in the neuronal system of the brain have a complex morphological structure, which diversifies the dynamics of neurons. In the granular layer of the cerebellum, there exists a unique cell type, the unipolar brush cell (UBC), that serves as an important relay cell for transferring information from outside mossy fibers to downstream granule cells. The distinguishing feature of the UBC is that it has a simple morphology, with only one short dendritic brush connected to its soma. Based on experimental evidence showing that UBCs exhibit a variety of dynamic behaviors, here we develop two simple models, one with a few detailed ion channels for simulation and the other one as a two-variable dynamical system for theoretical analysis, to characterize the intrinsic dynamics of UBCs. The reasonable values of the key channel parameters of the models can be determined by analysis of the stability of the resting membrane potential and the rebound firing properties of UBCs. Considered together with a large variety of synaptic dynamics installed on UBCs, we show that the simple-structured UBCs, as relay cells, can extend the range of dynamics and information from input mossy fibers to granule cells with low-frequency resonance and transfer stereotyped inputs to diverse amplitudes and phases of the output for downstream granule cells. These results suggest that neuronal computation, embedded within intrinsic ion channels and the diverse synaptic properties of single neurons without sophisticated morphology, can shape a large variety of dynamic behaviors to enhance the computational ability of local neuronal circuits.

5.
Front Comput Neurosci ; 13: 29, 2019.
Artículo en Inglés | MEDLINE | ID: mdl-31156415

RESUMEN

The brain as a neuronal system has very complex structures with a large diversity of neuronal types. The most basic complexity is seen from the structure of neuronal morphology, which usually has a complex tree-like structure with dendritic spines distributed in branches. To simulate a large-scale network with spiking neurons, the simple point neuron, such as the integrate-and-fire neuron, is often used. However, recent experimental evidence suggests that the computational ability of a single neuron is largely enhanced by its morphological structure, in particular, by various types of dendritic dynamics. As the morphology reduction of detailed biophysical models is a classic question in systems neuroscience, much effort has been taken to simulate a neuron with a few compartments to include the interaction between the soma and dendritic spines. Yet, novel reduction methods are still needed to deal with the complex dendritic tree. Here, using 10 individual Purkinje cells of the cerebellum from three species of guinea-pig, mouse and rat, we consider four types of reduction methods and study their effects on the coding capacity of Purkinje cells in terms of firing rate, timing coding, spiking pattern, and modulated firing under different stimulation protocols. We found that there is a variation of reduction performance depending on individual cells and species, however, all reduction methods can preserve, to some degree, firing activity of the full model of Purkinje cell. Therefore, when stimulating large-scale network of neurons, one has to choose a proper type of reduced neuronal model depending on the questions addressed. Among these reduction schemes, Branch method, that preserves the geometrical volume of neurons, can achieve the best balance among different performance measures of accuracy, simplification, and computational efficiency, and reproduce various phenomena shown in the full morphology model of Purkinje cells. Altogether, these results suggest that the Branch reduction scheme seems to provide a general guideline for reducing complex morphology into a few compartments without the loss of basic characteristics of the firing properties of neurons.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA